Detailed analysis of captured phishing page
Used to detect similar phishing pages based on HTML content
| Algorithm | Hash Value |
|---|---|
|
CONTENT
TLSH
|
T1F9522172C051A83B058BD2C5F739B78BB3C2868BCE17069AA7F9834D5FD5D80DC26526 |
|
CONTENT
ssdeep
|
192:j2zPwuLzvYhSROJlHZecHpH7HeWyzfHOqFyowJc:j2zdQxMHBrwJc |
Used to detect visually similar phishing pages based on screenshots
| Algorithm | Hash Value |
|---|---|
|
VISUAL
pHash
|
ec6d6c939296463c |
|
VISUAL
aHash
|
f1c181ffffffdf9f |
|
VISUAL
dHash
|
230307363b233e30 |
|
VISUAL
wHash
|
818181dfdb89879f |
|
VISUAL
colorHash
|
07600000006 |
|
VISUAL
cropResistant
|
230307363b233e30,67e5258787c39761 |
• Ameaça: Phishing
• Alvo: Clientes DPD
• Método: Impersonação via página de rastreamento.
• Exfil: date.php
• Indicadores: Incompatibilidade de domínio, Javascript ofuscado, formulário para coletar dados.
• Risco: Alto
The phishing site impersonates DPD and likely attempts to steal login credentials or other sensitive information, such as payment data, under the guise of rescheduling a delivery. The presence of a form action to date.php further supports this.
The website might also be used to distribute malware or redirect users to malicious websites via compromised or hidden links after collecting data. This can be done due to obfuscated code and unknown domain age.
Pages with identical visual appearance (based on perceptual hash)
Found 1 other scan for this domain